Page 1137 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1137
grave, from the time it’s created to the time it’s destroyed. The
following list includes some terms used to identify different phases of
data within its lifecycle:
Creation or Capture Data can be created by users, such as when a
user creates a file. Systems can create it, such as monitoring systems
that create log entries. It can also be captured, such as when a user
downloads a file from the internet and traffic passes through a border
firewall.
Classification It’s important to ensure that data is classified as soon
as possible. Organizations classify data differently, but the most
important consideration is to ensure that sensitive data is identified
and handled appropriately based on its classification. Chapter 5
discusses different methods used to define sensitive data and define
data classifications. Once the data is classified, personnel can ensure
that it is marked and handled appropriately, based on the
classification. Marking (or labeling) data ensures that personnel can
easily recognize the data’s value. Personnel should mark the data as
soon as possible after creating it. As an example, a backup of top secret
data should be marked top secret. Similarly, if a system processes
sensitive data, the system should be marked with the appropriate
label. In addition to marking systems externally, organizations often
configure wallpaper and screen savers to clearly show the level of data
processed on the system. For example, if a system processes secret
data, it would have wallpaper and screen savers clearly indicating it
processes secret data.
Storage Data is primarily stored on disk drives, and personnel
periodically back up valuable data. When storing data, it’s important
to ensure that it’s protected by adequate security controls based on its
classification. This includes applying appropriate permissions to
prevent unauthorized disclosure. Sensitive data should also be
encrypted to protect it. Backups of sensitive information are stored in
one location on-site, and a copy is stored at another location off-site.
Physical security methods protect these backups against theft.
Environmental controls protect the data against loss due to
environmental corruption such as heat and humidity.

